Software vulnerabilities are weaknesses that can either cause an accidental system failure or be intentionally exploited. To prevent this from happening, there are security measures such as Container Scanning that can help to identify vulnerabilities.
In this blog, we will provide instructions on how to set up vulnerability scanners for:
GCP Container Registry (GCR) Container Scanning
Google Container Scanning (Google Cloud Provider, Google Container Registry) provides automated and manual vulnerability scanning to fetch vulnerabilities from containers.
๐ Pro Tip: If youโre already doing container vulnerability scanning in GCP, you donโt need to take any action
If not, Secfix recommends you start container scanning, but do decide whether you want to do so yourself. You can learn more about container scanning here. When youโre ready, follow the instructions below to enable each GCP project:
Enable the Container Analysis API: This free API allows you to fetch your repositories.
Activate the Container Scanning API: Start scanning each container for vulnerabilities. This may incur additional charges from GCP.
๐ Once enabled, you can expect the vulnerabilities to be listed within an hour.
Azure Defender for Container Registries - Container Scanning
Microsoft Defender for Container Registries fetches vulnerabilities from containers. Azure Defender for Container Registries is a feature that automatically scans containers uploaded to Azure Container Registry for vulnerabilities.
๐ Pro Tip: If you already use Azure Defender for Container Registries, you donโt need to take any action
However, if youโd like to start using container scanning, follow these instructions:
Go to Pricing and Settings in the Azure Security Center.
Select the subscription you'd like to enable scanning on.
Under Container registries, toggle the switch to On, then scroll up and click Save.
๐ Once enabled, you can expect the vulnerabilities to be listed within an hour.
Amazon Inspector ECR Scanning
Amazon Inspector fetches vulnerabilities from your servers and provides a report.
To activate Amazon Inspector in your AWS account, opt for one of the two choices:
Amazon Inspector (recommended)
Amazon Inspector Classic (deprecated) - If choosing Classic, select the "Common Vulnerabilities and Exposures" package and "Weekly" frequency.
๐ Once enabled, you can expect the vulnerabilities to be listed within an hour.
AWS Elastic Container Registry (ECR) Container Scanning
Elastic Container Registry Scanning is fetching vulnerabilities from your containers.
To activate it, opt for one of the two choices:
Enhanced Scanning via Amazon Inspector (recommended)
Basic Scanning via Clair (deprecated)
๐ Once enabled, you can expect the vulnerabilities to be listed within an hour.
Third-Party Tools for Container Scanning
You can also use tools like Snyk to scan your entire infrastructure.
Instructions to activate Snyk in Digital Ocean
Instructions to activate Snyk in Open Telekom Cloud
โ